CrowdStrike Falcon Endpoint Protection Enterprise

  • CrowdStrike Falcon Endpoint Protection Enterprise

    Code: CR000002
    Manufacturer
    CrowdStrike
  • FALCON ENTERPRISE

    Unifies the technologies required to successfully stop breaches, including true next-gen antivirus and endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent.



    Falcon Enterprise
    Unified NGAV, EDR, managed threat hunting
    and integrated threat intelligence


    FALCON PREVENT
    Next-Generation Antivirus


    Read more...

    FALCON X
    Threat Intelligence


    Read more...

    FALCON DEVICE
    CONTROL
    USB Device Control


    Read more...

    FALCON FIREWALL MANAGEMENT
    Host Firewall Control


    Read more...

    FALCON INSIGHT
    Endpoint Detection & Responce


    Read more...

    FALCON OVERWATCH
    Threat hunting


    Read more...

    FALCON DISCOVER
    IT Hygiene
    AVAILABLE WITH
    FALCON ELITE
    Read more...

    FALCON IDENTITY PROTECTION
    Integrated Identity Security
    AVAILABLE WITH
    FALCON ELITE
    Read more...

    CROWDSTRIKE
    SERVICES
    Incident Response &
    Proactive Services
    LEARN MORE ABOUT
    CROWDSTRIKE SERVICES
    Read more...


    Flexible Bundles:  
    ✔ Included Component   ✚ Elective Component
     
    FALCON ENDPOINT PROTECTION ENTERPRISE
    Integrated Threat Intelligence
    Next Generation Antivirus
    Managed Threat Hunting Endpoint Detectionand Response

    BUSINESS VALUE

    Unify NGAV and EDR for full endpoint protection
    Enable threat hunting and real time visibility
    Uncover stealthy attacks
    Speed investigation and response
    Automatic analysis and orchestrated IOC sharing
    FEATURES AND CAPABILITIES

    VISIBILITY & EDR

    Continuous monitoring
    Raw event capture
    5 seconds searches
    Real-time response
    Complete visibility, context and attribution
    USB device visibility
    Firewall visibility


    PREVENTION

    Machine learning
    IOAs behavioral prevention
    Exploit blocking
    Custom hash blocking
    Protection on and off the network
    USB device control
    Firewall configuration management

    MANAGED THREAT HUNTING

    24/7 managed threat hunting
    Expert threat hunters
    Identify emerging threats
    In-app and email notifications

    INTEGRATED INTELLIGENCE

    Automatic malware analysis
    Automatic attribution
    Automatic IOC generation

    IDENTITY PROTECTION

    Hybrid identity landscape visibility
    Auto-classify Identity enterprise wide
    Real-time lateral movement and anomalous authentication detection
    Enables proactive identity based threat hunting
  • US IN SOCIAL NETWORKS